top How Bitcoin Could Be Key To Online Voting
FFS, doesn't anyone do any research before posting stories? 60 seconds of research would turn up the Wikipedia entry on
End-to-end audible voting systems. The problem of being able to verify that your vote is recorded as you intended without revealing the actual content of your vote has been solved by several teams. The ones that seem to have the best handle on things are Scantegrity, Pret-a-Voter, and Punchscan (the predecessor of Scantegrity) .
Using Bitcoin (which in fact has anti-anonymity properties) as an engine for voting is like attaching a tractor to a horse carriage. It may get you where you want to go, but it's nothing like a proper motor vehicle.
top Norse Security IDs 6, Including Ex-Employee, As Sony Hack Perpetrators
The evidence here is really, really weak. The connection is tenuous enough and the original pool of possible suspects via their methodology is large enough that I sure as heck wouldn't rule out a connection via random chance. Until we get better evidence, this isn't worth very much.
Norse Security says as much in The Fine Article:
Stammberger was careful to note that his company's findings are hardly conclusive, and may just add wrinkles to an already wrinkled picture of what happened at Sony Pictures. He said Norse employees will be briefing the FBI on Monday about their findings.
"They're the investigators," Stammberger said. "We're going to show them our data and where it points us. As far as whether it is proof that would stand up in a court of law? That's not our job to determine, it is theirs," he said of the FBI.
top British Army Looking For Gamers For Their Smart-Tanks
Geez how the press gets this sort of thing so wrong. It's not a tank, it's an Infantry Fighting Vehicle (IFV). It's lightly armored against small arms and small-bore auto-cannon rounds, not against ATGMs, tank main guns, or RPGs.
The weight at 34 tonnes is much less than that of any current front-line tank (according to Wikipedia the Challenger 2 is 62.5 tonnes, almost double the Scout SV). It is a lot heavier than most current IFV's (e.g., the German Marder at 28 tonnes or BMP-3 at 18.7 tonnes), but that may not be such a good thing. It makes strategic mobility more of a problem and ensures that the Scout SV can't swim across rivers by itself.
Some reporter just cut and pasted from the press release. Feh!
top Harvard's CompSci Intro Course Boasts Record-Breaking Enrollment
My son took the course last year as a senior in high school via iTunesU.
It's also available on EdX.
Heck, I took it way back thirty-odd years ago.
Also, here's a link to the original article in the Harvard Crimson:
top Ask Slashdot: Good Technology Conferences To Attend?
In chronological order looking forward:
MacTech Boot Camps -
http://www.mactech.com/bootcam... Small, local, inexpensive. Check to see if there's one close to you.
MacTech Conference -
http://www.mactech.com/confere... Larger, both sysadmin and developer tracks
http://www.macitconf.com/ Larger, multiple tracks and levels of knowledge
https://developer.apple.com/ww... The granddaddy of them all, but next to impossible to get into these days. Mostly developer focused. May not be useful if you don't already have a deep knowledge base.
http://macadmins.psu.edu/ The most education-focused of the conferences. Very knowledgeable presenters.
FWIW, I've been a presenter at MacTech Boot Camps, MacIT, and WWDC.
top After a User Dies, Apple Warns Against Counterfeit Chargers
See the commentary at the top of the page from this link:
about a year and a half ago
top Ask Slashdot: Rescuing a PC That's Been Hit By Scammers?
Lots of good advice so far, but one more item -- since your father has turned sysadmin tasks over to you, once you wipe and re-install, set up his account on the computer so that it is a restricted user account, not an admin account. If he isn't doing sysadmin tasks then he doesn't need the privs and this limits the amount of damage that a scammer can do to the computer. (Although getting his SSN and other info is still really bad.)
top Ask Slashdot: Managing Encrypted Android Devices In State and Local Gov't?
I'm a former Apple engineer, current independent consultant, so I'm not going to address the Android side. That's a lot more complicated -- I'll stick with talking about the iOS info that I know about.
That said, wow, there's a lot of snarky comments but not a lot of information posted.
iOS has full-device hardware encryption built-in on the iPhone 3GS and later, activated as soon as you set up a passcode. This top-level encryption layer is for quick device wipes, not for data protection. Each user data file is then encrypted on top of that using its own unique key, then set into a protection class by the app developer:
- Complete Protection - decrypted only when the device is unlocked; file key is removed from memory when the device is locked.
- Protected Unless Open - decrypted when the device is unlocked; if file is open when the device locks, the file stays open/decrypted.
- Protected Until First User Authentication - decrypted on first unlock, stays decrypted until reboot
- No Protection - file system encryption only; no per-file encryption key
Apple has really been on developers cases to tighten down the data protection classes for their apps on iOS.
In addition, iOS has a huge number of remote management options. Apple provides a basic management tool called Profile Manager in Lion Server, and there are third-party Mobile Device Managers (MDMs) that take the basics and go even further. You can force complex passcodes, pre-configure e-mail accounts, restrict usage of features, and so on. The enterpriseios.com site has a pretty complete listing.
One of the cool things about using iOS MDM is that all of the configuration profiles are tied to the management profile that gets installed when the device is first enrolled with the MDM. If you're in a BYOD situation and a user leaves on bad terms, the IT department can retract the management profile, which automatically retracts all of the other configuration profiles. This will delete corporate e-mail accounts, remove in-house apps (and their data!), take away VPN and 802.1X access, and so on, without erasing the person's device entirely. All of the pictures the person took are still there, not blown away as they would be after a complete device wipe.
Anyway, a few links that may help you out:
http://www.apple.com/iphone/business/integration/ http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf http://www.enterpriseios.com/ http://consultants.apple.com/index.php - look for consultants with the Mobility specialization https://help.apple.com/advancedserveradmin/mac/10.7/ - go into "Manage Users" --> "Profile Manager" on the right
Hope this helps.
top Best Software For Putting Lectures Online?
This is exactly the design scenario for Podcast Publisher and Podcast Library.
While it can take advantage of a whole cluster of servers, it can also run (albeit more slowly) on a single Core i7 Mini Server. For more detailed docs, see:
It's in use at lots of universities and some K-12 schools.
Hope this helps.
top Certificate Blunders May Mean the End For DigiNotar
This is just going through the motions. DigiNotar has been dead since August 30, when Google, Mozilla, and Microsoft all revoked trust in their certificates. Anyone with at least two brain cells (which seems to exclude a large number of managers, unfortunately) could see the writing on the wall. No one would ever buy a new DigiNotar certificate, since it would always pop up a scary warning to the user in a web browser. Why bother with buying a certificate from DigiNotar and dealing with the resulting end-user support issues, when you can buy from someone else and not have to deal with the problem?
More interesting to me is what will happen to DigiNotar's corporate parent, Vasco Data Security? The purchase of DigiNotar is relatively recent (January 10, 2011), so it's not clear how much influence Vasco's management had over DigiNotar's operations. At the very least, Vasco is going to need to pay for an audit of its own systems to reassure its direct customers.
top Security Researchers Crack APCO P25 Encryption
APCO 25 doesn't seem to be very well thought through. Easily jammed at multiple levels and vulnerable in many ways.
top Apple Criticized For Not Blocking Stolen Certs
I have detailed info and tools on my website at
The short story is that it is possible to protect yourself, but it requires deleting the DigiNotar root cert(s), then revoking trust on the two roots plus four intermediates.
top Dutch Government Revokes Diginotar Certificates
Apple is behind the curve on this, almost certainly due to a bug in the handling of Extended Validation certificates that needs to be fixed. Until then, I have info and tools on my web page to help users with the problem.
top Ask Slashdot: Overcoming Convention Hall Wi-Fi Interference?
"...announce on the loud speaker in a polite English accent..."
FYI, this will not work. Steve Jobs does not have an English accent.
top TN BlueCross Encrypts All Data After 57 Disks Stolen
$6 million is pocket change to a company that has $5.2 billion in annual revenue. However, the true cost is really higher, as encrypting everything means that things like disk corruption are no longer repairable, lost passwords can't be reset without losing data, and the like. It'd be interesting to see just what the ongoing costs are.
That said, I would like to compliment Tennessee BC/BS for doing the right thing, in spite of it costing money.
top PlanetLab Creates a More Advanced Sudo
Does no one remember 2007? Bob Watson presented a paper on exploiting concurrency to break all kinds of things like systrace back then, complete with example code. Vsys is the same kind of thing -- it has processes executing in an outside space where you can have a race condition and force the parameters to change after the clearance check but before it actually does the work. See:
top Cheap GPUs Rendering Strong Passwords Useless
consistently (a) remember a long password and (b) type it without a failure at least 50% of the time, is in the single digits.
This myth needs to end. Most people can memorize phrases hundreds of words long:
You missed the second part -- TYPE them consistently enough that they can get in without getting frustrated. I have no doubt that a large percentage of the general population can memorize long, complex passages at the
word level. The number that can get them consistently right at the character level is much lower. The number that can get them consistently right at the character level when they are required to change the phrase every six months drops to near zero.
top Cheap GPUs Rendering Strong Passwords Useless
What you're missing is that the percentage of the general population that can consistently (a) remember a long password and (b) type it without a failure at least 50% of the time, is in the single digits. Remember, general population, not geeks.
I've expressed the opinion for several years now that password authentication is broken, and that we need to move to two-factor authentication schemes ASAP.
top Epsilon Data Breach Bigger Than Just Kroger Customers' Data
Text of e-mail from Disney this morning:
We have been informed by one of our email service providers, Epsilon,
that your email address was exposed by an unauthorized entry into that provider's computer system. We use our email service providers to help us manage the large number of email communications with our guests. Our email service providers send emails on our behalf to guests who have chosen to receive email communications from us.
We regret that this incident has occurred and any inconvenience this
incident may cause you. We take your privacy very seriously, and we will continue to work diligently to protect your personal information.
We want to assure you that your email address was the only personal
information we have regarding you that was compromised in this incident.
As a result of this incident, it is possible that you may receive spam
email messages, emails that contain links containing computer viruses or other types of computer malware, or emails that seek to deceive you into providing personal or credit card information. As a result, you should be extremely cautious before opening links or attachments from unknown third parties or providing a credit card number or other sensitive information in response to any email.
If you have any questions regarding this incident, please contact us
at (407) 560-2547 during the hours of 9:00 am to 7:00 pm (Eastern Time) Monday through Friday, and 9:00 am through 5:00 pm (Eastern Time) Saturday and Sunday.
top Database of Private SSL Keys Published
Apple ran into something similar a long time ago for Mac OS X Server. The
servermgrd daemon uses a self-signed SSL cert by default to secure communications with remote management tools. About four or five versions back the certificate was identical across all installations because it was contained in the installer package. Someone had to go down and show them that you could read all of the traffic by using sslsniff and the private key from your own copy of the installer. They changed to an individual, automatically generated certificate shortly thereafter.